Beware of Pseudo-2 Factor Authentication
Please imagine that you are comparing two models of smartphones — Model A with a default pincode and Model B with a default pincode and biometrics.
You first hear that Model A is protected by pincode while Model B is protected by pincode and biometrics.
You then hear that Model A can be unlocked by pincode while Model B can be unlocked by pincode and biometrics.
You now hear that Model A can be attacked by pincode while Model B can be attacked by pincode and biometrics.
Which of Model A and Model B do you wish to use where you need good security?
Should you be interested to know where we are going, please watch this 2-minute video — https://youtu.be/wuhB5vxKYlg
Key References
Biometrics is to Password what Back door is to Front door
Removal of Passwords and Its Security Effect
Negative Security Effect of Biometrics Deployed in Cyberspace
External Body Features Viewed as ‘What We Are’
Additional References
For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)
What We Know for Certain about Authentication Factors
Digital Identity for Global Citizens
Image-to-Code Conversion by Expanded Password System
Summary and Brief History — Expanded Password System
Proposition on How to Build Sustainable Digital Identity Platform
Account Recovery with Expanded Password System
History, Current Status and Future Scenarios of Expanded Password System
Update: Questions and Answers — Expanded Password System and Related Issues
< Videos on YouTube>
Slide: Outline of Expanded Password System (3minutes 2seconds)
Digital Identity for Global Citizens (10minutes — narrated)
Demo: Simplified Operation on Smartphone for consumers (1m41s)
Demo: High-Security Operation on PC for managers (4m28s)
Demo: Simple capture and registration of pictures by users (1m26s)
Slide: Biometrics in Cyber Space — “below-one” factor authentication